A string of alphanumeric characters (usually random) that is stand-In for the user’s credentials that allows a user to access their applications/services, or allows other third-party applications to access the user’s application/service data without exposing the user’s credentials. Access tokens are short-lived and can be revoked by the user at any time, and needs to be refreshed periodically using Refresh-TokenAn Access-TokenA string of alphanumeric characters (usually random) that is stand-In for the user’s credentials that allows a user to access their applications/services, or allows other third-party applications to access the user’s application/service data without exposing the user’s credentials. Access tokens are short-lived and can be revoked by the user at any time, and needs to be refreshed periodically using Refresh-Token
. If token is compromised, the user’s credentials are not exposed, making damage minimal.×
is short lived, meaning on expiry user will have to re-authenticate(Authentication) The process of verifying the identity of a user or system to ensure that they are who they claim to be. It is commonly used to grant access to resources or services based on the user’s identity
(Authenticate) To log in to a system/service by providing valid credentials (e.g., username and password, biometric data, etc.).×
. Refresh-Token is string of alphanumeric characters (usually random) that can be used to be issued with a new Access Token after the current Access Token expires. It is used to maintain the user’s session without requiring the user to re-authenticate while ensuring the Access Token is short-lived and thereby more secure.×
. If token is compromised, the user’s credentials are not exposed, making damage minimal.
Algorithm
A set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.
API
Application Programming Interface is an interfaceA shared boundary/layer between two entities (e.g., software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
, devices, systems, etc.) that provides a means for them to communicate or interact with each other for exchanging information. It defines how access or interaction should occur between the entities.×
i.e. a shared-boundary/layer between two software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
that provides a means for them to communicate or interact with each other for exchanging information. It defines how access or interaction should occur between the two.
Authentication
The process of verifying the identity of a user or system to ensure that they are who they claim to be. It is commonly used to grant access to resources or services based on the user’s identity.
(Authenticate) To log in to a system/service by providing valid credentials (e.g., username and password, biometric data, etc.).
Authorization
The process of determining what a user or system is allowed to do or access. It involves granting or denying access/permissions based on the user’s identity, role, or other attributes.
Backend
The server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
and sends back responsesWhen a
receives a requestOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responses
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responses
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontend
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontend
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontend
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.
Binary-Code
Unlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bits
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.
Bit
The smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.
Cascading
A process in which an operation or set of operations is repeated multiple times, with the output of each operation becoming the input for the next operation.
Applying a priority order when multiple rules target the same element. The “cascade” ensures that the most specific rule (or the last one defined) wins, allowing different styles to be combined smoothly. In CSS\u200B CascadingA process in which an operation or set of operations is repeated multiple times, with the output of each operation becoming the input for the next operation.
Applying a priority order when multiple rules target the same element. The “cascade” ensures that the most specific rule (or the last one defined) wins, allowing different styles to be combined smoothly. In CSS
, inline > internal > external and id > class > element.×Style SheetsA style sheet language that used to describe the presentation or formatting of a document written in a markup languageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×
like HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
, typically defining how elements should be displayed or rendered across different media.×
is used for describing and styling the presentation of a document written in HTML. CSS describes how elements should be rendered on screen, on paper, in speech, or on other media. E.g., changing the color, font, size, spacing, positioning, and layout of elements on a web page.×
, inline > internal > external and id > class > element.
Cipher
An algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryption
of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryption
of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
/decryption-key
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryption
of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
/decryption-key
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.
CipherText
The secret scrambled code produced by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryption
of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
/decryption-key
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.
Client
A device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.
Client-Side
Things that happen on the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.
Compile
Computers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compilerComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.
Compiler
A program that compilesComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. It also checks for errors in the code, and optimizes the code for better performance. The output of the compilation process is an executable file that can then be run by the computer.
CSS
CascadingA process in which an operation or set of operations is repeated multiple times, with the output of each operation becoming the input for the next operation.
Applying a priority order when multiple rules target the same element. The “cascade” ensures that the most specific rule (or the last one defined) wins, allowing different styles to be combined smoothly. In CSS\u200B Cascading
Style SheetsA style sheet language that used to describe the presentation or formatting of a document written in a markup languageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×
like HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
, typically defining how elements should be displayed or rendered across different media.×
is used for describing and styling the presentation of a document written in HTML. CSS describes how elements should be rendered on screen, on paper, in speech, or on other media. E.g., changing the color, font, size, spacing, positioning, and layout of elements on a web page.×
, inline > internal > external and id > class > element.×Style SheetsA style sheet language that used to describe the presentation or formatting of a document written in a markup languageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×
like HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
, typically defining how elements should be displayed or rendered across different media.×
is used for describing and styling the presentation of a document written in HTML. CSS describes how elements should be rendered on screen, on paper, in speech, or on other media. E.g., changing the color, font, size, spacing, positioning, and layout of elements on a web page.
Database
A structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.
Data-Structure
A way of organizing and storing related data so that it can be accessed and modified efficiently. A way of structurally uniting/grouping data by defining the relationship between the data. For example
arrays
The process of converting encodedThe process of converting data from one form to another, usually to ensure that it is compatible with a specific format/system, or to efficiently and properly transmit/store the data. Examples include URL encoding, base64 encoding, etc. Unlike encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
, encoding does not provide security or confidentiality.×
data back to its original form. Decoding is the reverse of encoding and is used to retrieve the original data from its encoded form.
Decryption
The process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryption
of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
).×
/decryption-key
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.
Decryption-Key
A secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.
Discord
A platform where you can chat, speak, stream with your friends or communities. A Discord server is like a big group space. Servers contain channels which are like chat rooms for a specific topic. You can also join voice channels to talk/stream. Discord bots are user interactable community-made programs that can help you manage your server, play music, moderate, play games, etc that you can add to your server.
DNS
The Domain Name System translates/resolves website domain names into IP AddressesAn Internet-Protocol Address is a unique numerical label (e.g., 182.98.18.46) that identifies a device connected to the internetIt is like an intricate network of highways (data cables) connecting cities (serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
) and towns (clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
) across the globe. A network of network. It allows users to access and share information, resources, and services across the world and with each other.×
, or a local network that uses the Internet Protocol for communication. Being geo-locatable, it’s like a postal address for devices on the internet which helps in transmitting data efficiently between devices.×, which are used by browsers as the locations to requestOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
websites/webpage-componentsHTML, CSS files, JavaScript files, images, videos, etc. that make up a webpage. Related webpages make up a website, sharing a common domain name.×
from the web-serversA server that hosts website component files (such as HTML, CSS, JavaScript files, images, etc.) and an HTTP server that processes incoming requests from clients (web browsers) and responds with the requested resources. Web servers are accessed through the domain names of the websites they host.×
bearing those IP Addresses that hosts the files. It acts as the internet’s phone book, eliminating the need for users to remember IP addresses.
Encode
The process of converting data from one form to another, usually to ensure that it is compatible with a specific format/system, or to efficiently and properly transmit/store the data. Examples include URL encoding, base64 encoding, etc. Unlike encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
, encoding does not provide security or confidentiality.
Encryption
The process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.
Encryption-Key
A secret value (random string of characters) that is used to encryptThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryptionThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryptionThe process of converting plain-text data into a secret code (ciphertext
) to prevent unwanted people from reading it. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertext
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).
Framework
A collection of tools and librariesA collection of pre-written code that provides specific functionality to be used by other code. Libraries are reusable and can save time and effort by allowing developers to use existing code rather than writing it from scratch. All the public methods and signatures forms the API of the library.×
that help developers build applications more efficiently by providing pre-written code for common/boiler-plate tasks. Frameworks provide a structure for developing applications and enforce certain patterns and practices to ensure consistency and maintainability.
Frontend
The client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.
High-Level
Writing code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.
HTML
HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.
HTTP
HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×TransferExchange of data between the client and server.×
Protocol is the ProtocolA set of rules and guidelines that dictate how participants (whether they are devices, software components, or users) in a system should behave.×
that clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
(browsers) and serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
(Web-ServersA server that hosts website component files (such as HTML, CSS, JavaScript files, images, etc.) and an HTTP server that processes incoming requests from clients (web browsers) and responds with the requested resources. Web servers are accessed through the domain names of the websites they host.×
) use to communicate website componentsHTML, CSS files, JavaScript files, images, videos, etc. that make up a webpage. Related webpages make up a website, sharing a common domain name.×
with each other over the internetIt is like an intricate network of highways (data cables) connecting cities (serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
) and towns (clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
) across the globe. A network of network. It allows users to access and share information, resources, and services across the world and with each other.×
.
HTTPS
HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×TransferExchange of data between the client and server.×ProtocolA set of rules and guidelines that dictate how participants (whether they are devices, software components, or users) in a system should behave.×
Secure is the secure version of HTTP\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×TransferExchange of data between the client and server.×
Protocol is the ProtocolA set of rules and guidelines that dictate how participants (whether they are devices, software components, or users) in a system should behave.×
that clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
(browsers) and serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
(Web-ServersA server that hosts website component files (such as HTML, CSS, JavaScript files, images, etc.) and an HTTP server that processes incoming requests from clients (web browsers) and responds with the requested resources. Web servers are accessed through the domain names of the websites they host.×
) use to communicate website componentsHTML, CSS files, JavaScript files, images, videos, etc. that make up a webpage. Related webpages make up a website, sharing a common domain name.×
with each other over the internetIt is like an intricate network of highways (data cables) connecting cities (serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
) and towns (clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
) across the globe. A network of network. It allows users to access and share information, resources, and services across the world and with each other.×
.×. It encryptsThe process of converting plain-text data into a secret code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) to prevent unwanted people from reading it. A cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipher
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to encrypt (optionally with an encryption-keyA secret value (random string of characters) that is used to encrypt
plain-text data. The key is used by an encryption-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
/cipherAn algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×used for encryption
and decryptionThe process of converting secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
) back into plain-text data. A cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
is used to decrypt the data (optionally with a decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
) to reveal the original message.× of data. It takes plain-text data and converts it into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
), or vice-versa. It optionally uses an encryption-key
/decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-key
. Purpose is to keep information confidential and secure.×
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
to perform the operation. Examples include AES, DES, RSA, etc.×
to convert the plain-text data into a secret scrambled code (ciphertextThe secret scrambled code produced by a cipher
/encryption
-algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
when plain-text data is encrypted
. The cipher-text is unreadable without the correct decryption-keyA secret value (random string of characters) that is used to decrypt
secret scrambled code (ciphertext
) back into plain-text data. The key is used by a cipher
/algorithmA set of well-defined instructions that are executed/performed in an order to perform a task or solve a problem (e.g., a recipe for baking a cake). They are the building blocks of Computer-Science which are used to perform calculations, data processing, and automated reasoning tasks.×
to perform the decryption operation.×
. Purpose is to keep information confidential and secure.×
).×
) the data. The scrambled message can only be understood by someone who has the correct decryption key.×
the data exchanged between the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
and serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, ensuring that it cannot be intercepted, read and understood by unauthorized parties.
HyperText
A text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.
Idempotent
An operation that produces the same result no matter how many times it is executed. For example, a GET request is idempotent because it retrieves the same resource every time it is executed.
Interface
A shared boundary/layer between two entities (e.g., software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
, devices, systems, etc.) that provides a means for them to communicate or interact with each other for exchanging information. It defines how access or interaction should occur between the entities.
Internet
It is like an intricate network of highways (data cables) connecting cities (serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
) and towns (clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
) across the globe. A network of network. It allows users to access and share information, resources, and services across the world and with each other.
Interpret
Computers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.
Interpreter
A program that interpretsComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.
IP-Address
An Internet-Protocol Address is a unique numerical label (e.g., 182.98.18.46) that identifies a device connected to the internetIt is like an intricate network of highways (data cables) connecting cities (serversA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
) and towns (clientsA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
) across the globe. A network of network. It allows users to access and share information, resources, and services across the world and with each other.×
, or a local network that uses the Internet Protocol for communication. Being geo-locatable, it’s like a postal address for devices on the internet which helps in transmitting data efficiently between devices.
JavaScript
A high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.
JSON
JavaScript Object Notation is a lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parseThe process of analyzing a string of symbols to determine its grammatical structure with respect to a given formal grammar. It is used in programming to convert data from one format to another, such as from a string to a data structureA way of organizing and storing related data so that it can be accessed and modified efficiently. A way of structurally uniting/grouping data by defining the relationship between the data. For example
arrays
etc.×
. For example, parsing JSONJavaScript Object Notation is a lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parse
and generate. It is used to transmit data between software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
as an alternative to XMLExtensible Markup Language is a markup language that is commonly used to carry and describe data. It is a self-descriptive language that allows you to define your own tags and attributes.×
. While it is derived from JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
, it is language-independent.×
string data into a JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
object
, or parsing an HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
document into a DOM
tree, etc.×
and generate. It is used to transmit data between software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
as an alternative to XMLExtensible Markup Language is a markup language that is commonly used to carry and describe data. It is a self-descriptive language that allows you to define your own tags and attributes.×
. While it is derived from JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
, it is language-independent.
Library
A collection of pre-written code that provides specific functionality to be used by other code. Libraries are reusable and can save time and effort by allowing developers to use existing code rather than writing it from scratch. All the public methods and signatures forms the API of the library.
Low-Level
Writing code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
.
Machine-Code
Most fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
programming language.
MAC-Address
A Media Access Control Address is a hardware identifier that uniquely identifies each device on a network. Primarily, the manufacturer assigns it. They are often found on a device’s network interface controller (NIC) card.
Markup-Language
Systems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.
Parse
The process of analyzing a string of symbols to determine its grammatical structure with respect to a given formal grammar. It is used in programming to convert data from one format to another, such as from a string to a data structureA way of organizing and storing related data so that it can be accessed and modified efficiently. A way of structurally uniting/grouping data by defining the relationship between the data. For example
arrays
etc.×
. For example, parsing JSONJavaScript Object Notation is a lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parseThe process of analyzing a string of symbols to determine its grammatical structure with respect to a given formal grammar. It is used in programming to convert data from one format to another, such as from a string to a data structureA way of organizing and storing related data so that it can be accessed and modified efficiently. A way of structurally uniting/grouping data by defining the relationship between the data. For example
arrays
etc.×
. For example, parsing JSON
string data into a JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
object
, or parsing an HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
document into a DOM
tree, etc.×
and generate. It is used to transmit data between software componentsA server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.×
as an alternative to XMLExtensible Markup Language is a markup language that is commonly used to carry and describe data. It is a self-descriptive language that allows you to define your own tags and attributes.×
. While it is derived from JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
, it is language-independent.×
string data into a JavaScriptA high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-level
languages. Lesser work required to translate the code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-level
programming language.×
.×
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
, interpreted programming languageComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
that is used to make web pages interactive and dynamic. It is used to create responsive, interactive elements on web pages, such as pop-ups, animations, form validation, and more. JavaScript is executed on the client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
(browser) and can interact with the DOM
of a web page to update content, style, and structure.×
object
, or parsing an HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
document into a DOM
tree, etc.
Port
A specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections.
Can be described as an internal address within a host computer that identifies a program or process
Protocol
A set of rules and guidelines that dictate how participants (whether they are devices, software components, or users) in a system should behave.
Rate-Limit
A restriction on the number of requests a client (user or application) can make to a server within a specified time frame. Rate limiting is used to prevent abuse, protect against denial-of-service attacks, and ensure fair usage of resources.
Refresh-Token
An Access-TokenA string of alphanumeric characters (usually random) that is stand-In for the user’s credentials that allows a user to access their applications/services, or allows other third-party applications to access the user’s application/service data without exposing the user’s credentials. Access tokens are short-lived and can be revoked by the user at any time, and needs to be refreshed periodically using Refresh-TokenAn Access-Token
is short lived, meaning on expiry user will have to re-authenticate(Authentication) The process of verifying the identity of a user or system to ensure that they are who they claim to be. It is commonly used to grant access to resources or services based on the user’s identity
(Authenticate) To log in to a system/service by providing valid credentials (e.g., username and password, biometric data, etc.).×
. Refresh-Token is string of alphanumeric characters (usually random) that can be used to be issued with a new Access Token after the current Access Token expires. It is used to maintain the user’s session without requiring the user to re-authenticate while ensuring the Access Token is short-lived and thereby more secure.×
. If token is compromised, the user’s credentials are not exposed, making damage minimal.×
is short lived, meaning on expiry user will have to re-authenticate(Authentication) The process of verifying the identity of a user or system to ensure that they are who they claim to be. It is commonly used to grant access to resources or services based on the user’s identity
(Authenticate) To log in to a system/service by providing valid credentials (e.g., username and password, biometric data, etc.).×
. Refresh-Token is string of alphanumeric characters (usually random) that can be used to be issued with a new Access Token after the current Access Token expires. It is used to maintain the user’s session without requiring the user to re-authenticate while ensuring the Access Token is short-lived and thereby more secure.
Response
When a
receives a requestOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.
Request
Often, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requestsOften, it is the backend
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
and sends back responsesWhen a
receives a requestOften, it is the backend
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backend
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backend
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backend
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requestsOften, it is the backend
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backend
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a requestOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responses
to the clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requests
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
from a clientA device or software that accesses services or resources provided by a serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responses
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend serverA computer program or a device that provides functionality to other devices or programs, known as client
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
to do so. This asking is called a request, often over the network. The server processes the request and sends back a response
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.
Server
A computer program or a device that provides functionality to other devices or programs, known as clients
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.
Server-Process
A program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
machine.
Server-Side
Things that happen on the serverA computer program or a device that provides functionality to other devices or programs, known as clientA device or software that accesses services or resources provided by a server
by making requestsOften, it is the backendThe server-sideThings that happen on the server
, e.g., processing of requests, interacting with databases, etc.×
/behind-scenes of an application that is responsible for storing and handling data, interacting with databasesA structured collection of related data that is stored and organized in a way that allows for efficient retrieval, updating, and management. Databases are used to store information for applications, websites, and other systems.×
, performing user operations, computations, etc. It processes requests
and sends back responsesWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
to the client
/frontendThe client-side\u200B Things that happen on the client
, e.g., rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing, etc.×
/front-scenes of a application that is responsible for rendering of the user-interfaceThe visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.×
, handling user interactions and events, sending requests
to the server
, computing.×
.×
that stores and handles data, performs operations, etc. The client
/
when it needs data or wants to perform an operation, it must ask the backend server
to do so. This asking is called a request, often over the network. The server processes the request and sends back a responseWhen a
receives a request
from a client
, it figures out what the client wants, processes the request and answers back to the client. This answer is called a response. The response typically contains the requested data or information, along with a status code indicating the success or failure of the request.×
.×
. Clients can be website/browsers, mobile applications, desktop applications, etc.×
, by responding to their requests. These devices are typically dedicated to serving the needs of other programs or users, therefore being powerful machines which lack output devices like a monitor.×
, e.g., processing of requests, interacting with databases, etc.
Socket
Port + IP Address. Also known as a communication endpoint.
A socket is one endpoint of a two-way communication link between two programs running on the network.
Software-Component
A server-processA program that runs on a computer an a specific portA specific point of communication that allows a computer to send and receive data over a network. Ports are identified by numbers, and each port is associated with a specific protocol or service. For example, port 80 is commonly used for HTTP traffic, and port 5432 is used for PostgreSQL database connections
Can be described as an internal address within a host computer that identifies a program or process×
and listens for incoming requests from clients
over a network. It processes these requests and sends back responses to the clients. E.g., a web server, database server, etc. These processes usually run on a server
machine.×
(e.g. a web server, database server, etc.), a client application (e.g. a website/browser, mobile app, desktop app, etc.), or a library/module that provides specific functionality to a software system.
Source-Code
The raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretationComputers cannot understand or execute source-code
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpretingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compiling
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretationComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilationComputers cannot understand or execute source-code
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
or interpretation
.×
. Interpretation is the process of translating a line of source-code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
AND then executing it BEFORE moving to the next line as opposed to compilingComputers cannot understand or execute source-codeThe raw textual human-readable code of a computer program written by a programmer in a programming language. Computers do not understand this version of code, thus it needs to be translated into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.×
before it can be executed. Translation is achieved through the process of compilation
or interpretation
.×
. Compilation is the process of translating the complete source code into machine-codeMost fundamental language a computer can understand and execute directly without needing some ’translation’. Operates at hardware level i.e. consists of instructions (made up of binary codeUnlike humans who use and understand variety of symbols/values (0-9, A-Z, special characters), a computer is a base-2 system that uses and understands only bitsThe smallest unit of data that represents a binary value, either 0 or 1. Basis for binary-code
and all computer operations. A group of 8 bits is called a byte which is the standard unit of data storage in computers.×
. Computers use binary code (a series of bits) to represent all data, instructions, and information (whether it’s text, images, sound, etc. ). It is the most machine readable and least human readable form of data.×
) that corresponds to a specific operation the CPU can perform; thereby being specific to a computer’s architecture. Also called machine-language/machine-code. It is the lowest-levelWriting code that is closer to the computer’s hardware, it is like directly speaking to the computer in its own language making it more efficient and fast but less human readable. Involves giving very specific instructions about how the computer’s memory and processor should work. It can be more complex and harder to write than high-levelWriting code that is easy to read and write for humans. It is abstracted from the details of the computer’s hardware and is closer to human language than machine-language
. High-level languages are more expressive and less complex than low-level
languages. However, they are less efficient and slower to execute than low-level languages and more work is required to convert them to machine code.×
languages. Lesser work required to translate the code into machine-code
.×
programming language.× before the program is executed, opposed to interpreting
. A compiler
is required only once, and the compiled code can be executed multiple times. Compiled languages are ‘faster’ because the whole code is already translated.×
. The system will ALWAYS require an interpreterA program that interprets
.×
software to execute the program. Interpreted languages are ‘slower’ because translation has to be done during run-time
and every time the program is executed.×
.
Style-Sheet-Language
A language used to describe the presentation or formatting of a document written in a markup languageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×
like HTML\u200B HyperTextA text that contains links to other texts. When you click on a link, you are taken to another text. In the context of the web
, it refers to web pages that contain links to other web pages.×
markup language is the standard Markup-LanguageSystems for annotating a document in a way that is syntactically distinguishable from the text. The annotations typically define how the document should be structured, formatted, or displayed. They are static and do not have any logic or programming capabilities.×for creating web pages and web applications. It describes the structure and semantic meaning of web content using a system of tags and attributes. HTML elements are the building blocks of a website, e.g. headings (), paragraphs (), images (), links (), etc which can be nested inside each other. The browser reads the HTML file and renders the content on the screen.×
, typically defining how elements should be displayed or rendered across different media.
Transfer
Exchange of data between the client and server.
UI
User Interface, the visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.
User-Interface
The visual elements of a software application that users interact with, such as buttons, menus, forms, and other controls. It is designed to be intuitive, user-friendly, and responsive to user input.
UX
User Experience, the overall experience of a person using a product such as a website or computer application, especially in terms of how easy or pleasing it is to use.
URL
A Uniform Resource Locator is a web address that specifies the location of a resource on the internet. It consists of a protocol (e.g., HTTP, HTTPS), a domain name (e.g., example.com), a path to the resource (e.g., /blog) and optional query parameters (e.g., ?id=123) to makeup a complete URL, e.g., https://example.com/blog?id=123.
WebPage-Components
HTML, CSS files, JavaScript files, images, videos, etc. that make up a webpage. Related webpages make up a website, sharing a common domain name.
Web-Server
A server that hosts website component files (such as HTML, CSS, JavaScript files, images, etc.) and an HTTP server that processes incoming requests from clients (web browsers) and responds with the requested resources. Web servers are accessed through the domain names of the websites they host.
XML
Extensible Markup Language is a markup language that is commonly used to carry and describe data. It is a self-descriptive language that allows you to define your own tags and attributes.